| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CRCLon / USDC 1% | uniswap_v3 | 0xb181...bcdf | 76.2160813139891 |
| CRCLon / USDC 0.3% | uniswap_v3 | 0x1321...73aa | 77.1848442773248 |
| CRCLon / USDC 28% | uniswap-v4-ethereum | 0xd850...326e | 119.8329265654 |
| CRCLon / ETH 49% | uniswap-v4-ethereum | 0xdbed...41db | 67.4092889553 |
| CRCLon / USDT 50% | uniswap-v4-ethereum | 0x0318...3fdb | 69.5505885415 |
| CRCLon / USDC 29% | uniswap-v4-ethereum | 0x2526...1093 | 118.4666134914 |
| CRCLon / USDC 30% | uniswap-v4-ethereum | 0x39aa...0d00 | 119.0054621074 |
| CRCLon / USDC 70% | uniswap-v4-ethereum | 0xb0cf...f5cc | 69.3401823623 |
| CRCLon / USDT 40% | uniswap-v4-ethereum | 0x18d7...3c6b | 72.1559316576 |
| CRCLon / USDT 80% | uniswap-v4-ethereum | 0xbd7d...04ce | 774.317863435 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.